<--- Back to Details
First PageDocument Content
Secret sharing / Cloud computing / Secure multi-party computation / Access structure / Yvo G. Desmedt / Cryptography / Cryptographic protocols / Key management
Date: 2012-05-09 09:13:20
Secret sharing
Cloud computing
Secure multi-party computation
Access structure
Yvo G. Desmedt
Cryptography
Cryptographic protocols
Key management

CETA Workshop–November 2011-Secret Sharing and Reliable Cloud Computing

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 154,31 KB

Share Document on Facebook

Similar Documents

Nucleic Acids Research Advance Access published June 27, 2014 Nucleic Acids Research, doi: nar/gku459 SARA-Coffee web server, a tool for the computation of RNA sequence and structure multiple alignments

DocID: 1vgqa - View Document

UnSAID: Uncertainty and Structure in the Access to Intensional Data Pierre Senellart

DocID: 1vf38 - View Document

EDUINDIA BY INDIA EDUCATION PARTNERS A private growth debt fund fostering education access and retention in India I) The Opportunity: K-12 Education in India The Loan: Demand Dividend Structure

DocID: 1uqhT - View Document

UnSAID: Uncertainty and Structure in the Access to Intensional Data Pierre Senellart

DocID: 1ubI0 - View Document

FISTS Code Crusade Page AddedThe ARRL has announced they will submit a proposal to the FCC. This proposal essentially includes: *A three-tiered licensing structure, two of which permit HF access without a Mors

DocID: 1tIUq - View Document